A Framework for Managing User-defined Security Policies to Support Network Security Functions Eunsoo Kim Sungkyunkwan University Republic of Korea eskim86@skku.edu Kuyju Kim Sungkyunkwan University Republic of Korea kuyjukim@skku.edu Seungjin Lee Sungkyunkwan University Republic of Korea jine33@skku.edu Jaehoon (Paul) Jeong Sungkyunkwan University Republic of Korea pauljeong@skku.edu Hyoungshick Kim Sungkyunkwan University Republic of Korea hyoung@skku.edu ABSTRACT Network Functions Virtualization (NFV) and Software Defned Net- working (SDN) make it easier for security administrators to manage security policies on a network system. However, it is still chal- lenging to map high-level security policies defned by users into low-level security policies that can be applied to network security devices. To address this problem, we introduce a framework for efectively managing user-defned security policies for network security functions based on standard interfaces that are currently being standardized in an IETF working group. To show the feasibil- ity of the proposed framework, we implemented a prototype based on the RESTCONF protocol and showed that the proposed frame- work can be applied in real-world scenarios for network separation, DDoS mitigation and ransomeware prevention. CCS CONCEPTS · Networks Network architectures; Middle boxes / network ap- pliances; Network management ; KEYWORDS Security management; Security policy; NSF; ACM Reference Format: Eunsoo Kim, Kuyju Kim, Seungjin Lee, Jaehoon (Paul) Jeong, and Hyoung- shick Kim. 2018. A Framework for Managing User-defned Security Policies to Support Network Security Functions. In Proceedings of The 12th Inter- national Conference on Ubiquitous Information Management and Commu- nication (IMCOM ’18), Jennifer B. Sartor, Theo D’Hondt, and Wolfgang De Meuter (Eds.). ACM, New York, NY, USA, 8 pages. https://doi.org/10.1145/ 3164541.3164569 Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for proft or commercial advantage and that copies bear this notice and the full citation on the frst page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specifc permission and/or a fee. Request permissions from permissions@acm.org. IMCOM ’18, January 2018, Langkawi, Malaysia © 2018 Association for Computing Machinery. ACM ISBN 978-1-4503-6385-3/18/01. . . $15.00 https://doi.org/10.1145/3164541.3164569 1 INTRODUCTION Defning security policies for a network system is a difcult and complicated task that often requires deep knowledge of a particu- lar vendor’s protocols and network commands. This has been the biggest challenge for system administrators who are responsible for managing network systems. This problem is further amplifed for network environments with Network Security Functions (NSFs) provided by multiple vendors with proprietary interfaces [11]. In many situations, NSFs can be used to achieve security goals such as integrity, confdentiality and availability to protect a network system by detecting malicious trafc and/or reducing the impact of cyber attacks on the network system [7]. In practice, however, it is very cumbersome to manage and enforce various security policies and confgurations on NSFs due to various business requirements and the complexity of security practices for satisfying those require- ments. The detailed challenging issues are as follows: First, it is not easy to consider new security requirements and the corresponding security rules in a timely way in response to adaptive and sophisticated attacks which are evolved over time. Second, the cost of managing security policies is likely to increase because multiple vendors’ network devices and security solutions can typically be used in a mixed way for a network system. In general, each vendor uses its own proprietary interface, which makes system administrators harder to set up vendor-specifc rules and confgurations. Third, large companies generally require very complicated security requirements for various users and devices, which may produce complicated security rules. To address those issues, several architectures were introduced based on Software-Defned Networking (SDN) and Network Func- tions Virtualization (NFV). For example, the Internet engineering Task Force (IETF) Interface to Network Security Functions (I2NSF) working group aims to defne and implement standard interfaces for controlling and managing NSFs. This standardization defnes an architecture and interfaces for network security services using SDN and NFV. However, it is still unclear how (relatively compli- cated) high-level security policies defned by users can be mapped into low-level security policies for network devices, and then the low-level security policies can be confgured on those devices. In this paper, we propose a framework to efectively translate high-level security policies for users into low-level security poli- cies for network devices. To show the feasibility of the proposed